140 research outputs found

    On the standardisation of Web service management operations

    Get PDF
    Given the current interest in TCP/IP network management research towards Web services, it is important to recognise how standardisation can be achieved. This paper mainly focuses on the standardisation of operations and not management information. We state that standardisation should be done by standardising the abstract parts of a WSDL document, i.e. the interfaces and the messages. Operations can vary in granularity and parameter transparency, creating four extreme operation signatures, all of which have advantages and disadvantages

    Editorial

    Get PDF

    A Dynamic SNMP to XML Proxy Solution

    Get PDF
    Abstract: The network management area has some proposals to use XML to encode information models and managed object instances. In this paper we present a solution to dynamically create SNMP to XML proxies using a SAX parser and the translation facilities from the libsmi tools. We also present an analysis system that uses the management information provided by the proxies in XML

    Internet Services:Management Beyond the Element - A Report on DSOM'2001

    Get PDF
    The report from Annual International Workshop on 'Distributed Systems: Operations and Management' is presented. The theme of workshop was 'Internet services: management beyond the element' which reflected the shift within current Internet from managing isolated network elements to managing integrated end-to-end services. The topics discussed at workshop included service provisioning, application management, customer care, QoS management, policy languages and IP applications. The tutorial on 'JMX in Java & Management Environments' described status of JMX and possible ways to integrate JMX in JAVA environment

    Solving large-scale transmission network problems

    Get PDF
    Electricity is supplied by generators to meet the demand of the customers through the transmission lines. The flow-based optimization models in the literature seek for optimal generation cost while satisfying the demand and the physical constraints of the network. However, electricity transmission can be disrupted by exogenous factors such as weather conditions, terrorist attacks, human and operational errors or voltage drop due to line losses. These factors can generate a risk in the system leading to unmet demand of customers. Furthermore, this risk increases when the distances between the generators and the demand points becomes larger. In this thesis, we propose an electric network optimization model which emphasizes the risk arising from the long distance electricity transmission. In an electric network, if generators satisfy the demand in their vicinity, the arising risk from long distance electricity transmission can be reduced. In this regard, we use a path-based electric network optimization model where the objective is to minimize a risk function based on the path lengths and the flows. This risk function is obtained by incorporating a path length dependent risk coefficient into the convex quadratic generator cost function. Our work differs from the works in the literature as we consider such at risk function. To solve the resulting model, we employ column generation. However, column generation is not applicable when the objective function is convex quadratic. Therefore first, the convex quadratic function is approximated by a piece-wise linear convex function. However, the linear programming equivalent of this model causes a row-wise increase. This increase would cause to change the given solution approach. Thus second, an equivalent linear programming model without a row-wise increase is presented. The resulted model is solved with standard column generation and the numerical results are obtained for example networks

    Tietoverkkojen valvonnan yhdenmukaistaminen

    Get PDF
    As the modern society is increasingly dependant on computer networks especially as the Internet of Things gaining popularity, a need to monitor computer networks along with associated devices increases. Additionally, the amount of cyber attacks is increasing and certain malware such as Mirai target especially network devices. In order to effectively monitor computer networks and devices, effective solutions are required for collecting and storing the information. This thesis designs and implements a novel network monitoring system. The presented system is capable of utilizing state-of-the-art network monitoring protocols and harmonizing the collected information using a common data model. This design allows effective queries and further processing on the collected information. The presented system is evaluated by comparing the system against the requirements imposed on the system, by assessing the amount of harmonized information using several protocols and by assessing the suitability of the chosen data model. Additionally, the protocol overheads of the used network monitoring protocols are evaluated. The presented system was found to fulfil the imposed requirements. Approximately 21% of the information provided by the chosen network monitoring protocols could be harmonized into the chosen data model format. The result is sufficient for effective querying and combining the information, as well as for processing the information further. The result can be improved by extending the data model and improving the information processing. Additionally, the chosen data model was shown to be suitable for the use case presented in this thesis.Yhteiskunnan ollessa jatkuvasti verkottuneempi erityisesti Esineiden Internetin kasvattaessa suosiotaan, tarve seurata sekä verkon että siihen liitettyjen laitteiden tilaa ja mahdollisia poikkeustilanteita kasvaa. Lisäksi tietoverkkohyökkäysten määrä on kasvamassa ja erinäiset haittaohjelmat kuten Mirai, ovat suunnattu erityisesti verkkolaitteita kohtaan. Jotta verkkoa ja sen laitteiden tilaa voidaan seurata, tarvitaan tehokkaita ratkaisuja tiedon keräämiseen sekä säilöntään. Tässä diplomityössä suunnitellaan ja toteutetaan verkonvalvontajärjestelmä, joka mahdollistaa moninaisten verkonvalvontaprotokollien hyödyntämisen tiedonkeräykseen. Lisäksi järjestelmä säilöö kerätyn tiedon käyttäen yhtenäistä tietomallia. Yhtenäisen tietomallin käyttö mahdollistaa tiedon tehokkaan jatkojalostamisen sekä haut tietosisältöihin. Diplomityössä esiteltävän järjestelmän ominaisuuksia arvioidaan tarkastelemalla, minkälaisia osuuksia eri verkonvalvontaprotokollien tarjoamasta informaatiosta voidaan yhdenmukaistaa tietomalliin, onko valittu tietomalli soveltuva verkonvalvontaan sekä varmistetaan esiteltävän järjestelmän täyttävän sille asetetut vaatimukset. Lisäksi työssä arvioidaan käytettävien verkonvalvontaprotokollien siirtämisen kiinteitä kustannuksia kuten otsakkeita. Työssä esitellyn järjestelmän todettiin täyttävän sille asetetut vaatimukset. Eri verkonvalvontaprotokollien tarjoamasta informaatiosta keskimäärin 21% voitiin harmonisoida tietomalliin. Saavutettu osuus on riittävä, jotta eri laitteista saatavaa informaatiota voidaan yhdistellä ja hakea tehokkaasti. Lukemaa voidaan jatkossa parantaa laajentamalla tietomallia sekä kehittämällä kerätyn informaation prosessointia. Lisäksi valittu tietomalli todettiin soveltuvaksi tämän diplomityön käyttötarkoitukseen
    corecore